Exploring Touch-Screen Biometrics for User Identification on Smart Phones

作者: Julio Angulo , Erik Wästlund

DOI: 10.1007/978-3-642-31668-5_10

关键词:

摘要: The use of mobile smart devices for storing sensitive information and accessing online services is increasing. At the same time, methods authenticating users into their that are not only secure, but also privacy user-friendly needed. In this paper, we present our initial explorations lock pattern dynamics as a secure two-factor authentication method. We developed an application Android platform to collect data on way individuals draw patterns touchscreen. Using Random Forest machine learning classifier method achieves average Equal Error Rate (EER) approximately 10.39%, meaning biometrics can be used identifying towards device, could pose threat if users’ biometric handled outside control.

参考文章(33)
Ge Zhang, Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users information security conference. pp. 247- 258 ,(2011) , 10.1007/978-3-642-21424-0_20
Saira Zahid, Muhammad Shahzad, Syed Ali Khayam, Muddassar Farooq, Keystroke-Based User Identification on Smart Phones recent advances in intrusion detection. pp. 224- 243 ,(2009) , 10.1007/978-3-642-04342-0_12
Kevin Killourhy, Roy Maxion, Why Did My Detector Do That recent advances in intrusion detection. pp. 256- 276 ,(2010) , 10.1007/978-3-642-15512-3_14
Jan-Erik Ekberg, Mobile Trusted Computing Based on MTM International Journal of Dependable and Trustworthy Information Systems. ,vol. 1, pp. 25- 42 ,(2010) , 10.4018/JDTIS.2010100102
Sevasti Karatzouni, Nathan Clarke, Keystroke Analysis for Thumb-based Keyboards on Mobile Devices information security conference. pp. 253- 263 ,(2007) , 10.1007/978-0-387-72367-9_22
Nathan Clarke, Sevasti Karatzouni, Steven Furnell, Flexible and Transparent User Authentication for Mobile Devices information security conference. ,vol. 297, pp. 1- 12 ,(2009) , 10.1007/978-3-642-01244-0_1
Kevin Killourhy, Roy Maxion, Why did my detector do that?!: predicting keystroke-dynamics error rates recent advances in intrusion detection. pp. 256- 276 ,(2010)
Adam J Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M Smith, None, Smudge attacks on smartphone touch screens WOOT'10 Proceedings of the 4th USENIX conference on Offensive technologies. pp. 1- 7 ,(2010)
Mohammad Nauman, Tamleek Ali, TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones international conference on information security. ,vol. 76, pp. 286- 297 ,(2010) , 10.1007/978-3-642-13365-7_28